Name
Papers
Collaborators
BINXING FANG
227
398
Citations 
PageRank 
Referers 
380
88.26
1105
Referees 
References 
3647
1810
Search Limit
1001000
Title
Citations
PageRank
Year
SmartIdx: Reducing Communication Cost in Federated Learning by Exploiting the CNNs Structures.00.342022
Exploiting Knowledge for Better Mobility Support in the Future Internet00.342022
Adapting Named Data Networking (NDN) for Better Consumer Mobility Support in LEO Satellite Networks10.352021
D 2 Graph: An Efficient and Unified Out-of-Core Graph Computing Model00.342021
Finding Route Hotspots in Large Labeled Networks00.342021
Multi-level Directed Fuzzing for Detecting Use-after-Free Vulnerabilities00.342021
Mining top-k sequential patterns in transaction database graphs: A new challenging problem and a sampling-based approach00.342020
QSAN: A Quantum-probability based Signed Attention Network for Explainable False Information Detection00.342020
AFLPro: Direction sensitive fuzzing00.342020
EDCleaner: Data Cleaning for Entity Information in Social Network00.342019
Mann: A Multichannel Attentive Neural Network For Legal Judgment Prediction10.362019
A Low-overhead Kernel Object Monitoring Approach for Virtual Machine Introspection.00.342019
A More Efficient Private Set Intersection Protocol based on Random OT and Balance hash00.342019
VMRe: A Reverse Framework of Virtual Machine Protection Packed Binaries00.342019
Towards a Comprehensive Insight into the Eclipse Attacks of Tor Hidden Services30.422019
Analyzing and Predicting the Popularity of Online Content Using the Weak Ties Theory.00.342019
Automated Vulnerability Discovery and Exploitation in the Internet of Things.00.342019
Modeling, measuring, and analyzing the resolution process of popular domains00.342019
Leakage Models and Inference Attacks on Searchable Encryption for Cyber-Physical Social Systems10.352018
Security Measurement for Unknown Threats Based on Attack Preferences.10.362018
Stock Market Prediction via Multi-Source Multiple Instance Learning.40.412018
Exploiting Investors Social Network for Stock Prediction in China's Market.10.352018
Sapiens Chain: A Blockchain-based Cybersecurity Framework.00.342018
Evaluation on Availability of Entity Information in Cyberspace.00.342018
Detection of Malicious Domain Names Based on Hidden Markov Model.00.342018
A flexible and efficient container-based NFV platform for middlebox networking.00.342018
Topic Analysis Model for Online Social Network00.342018
A Closer Look At Eclipse Attacks Against Tor Hidden Services00.342017
RICS-DFA: a space and time-efficient signature matching algorithm with Reduced Input Character Set.00.342017
A Survey on Data Cleaning Methods in Cyberspace10.382017
IAD: Interaction-Aware Diffusion Framework in Social Networks.10.352017
Succinct and practical greedy embedding for geometric routing.00.342017
Keep all mobile users' whereabouts secure: a radio frequency identification protocol anti-tracking in 5G10.352016
Modeling Mobile Cellular Networks Based On Social Characteristics00.342016
Towards Route Dynamics In As-Level Path Prediction10.372016
Community-Based Recommendations: A Solution to the Vulnerability Problem00.342016
Understanding information interactions in diffusion: an evolutionary game-theoretic perspective.20.382016
Understanding Information Diffusion under Interactions.20.362016
An ICN-Oriented Name-Based Routing Scheme00.342015
Online Detection of Concurrent Prefix Hijacks.10.342014
Utility-based cooperative decision in cooperative authentication.50.492014
A Moving Target Framework to Improve Network Service Accessibility00.342014
A Multiobjective Particle Swarm Optimization-Based Partial Classification for Accident Severity Analysis10.352014
POSTER: TraceVirt: A Framework for Detecting the Non-tampering Attacks in the Virtual Machine00.342014
Predicting the topic influence trends in social media with multiple models70.462014
T-Yun: Trustworthiness Verification And Audit On The Cloud Providers10.342013
Botnet Triple-Channel Model: Towards Resilient and Efficient Bidirectional Communication Botnets.10.432013
Understanding the topologies of BitTorrent networks: A measurement view00.342012
SDFA: series DFA for memory-efficient regular expression matching00.342012
An efficient and sustainable self-healing protocol for Unattended Wireless Sensor Networks00.342012
  • 1
  • 2